Sciweavers

599 search results - page 107 / 120
» The repeater tree construction problem
Sort
View
ICDE
2000
IEEE
121views Database» more  ICDE 2000»
15 years 11 months ago
Creating a Customized Access Method for Blobworld
We present the design and analysis of a customized access method for the content-based image retrieval system, Blobworld. Using the amdb access method analysis tool, we analyzed t...
Megan Thomas, Chad Carson, Joseph M. Hellerstein
160
Voted
POPL
2008
ACM
15 years 10 months ago
Lightweight semiformal time complexity analysis for purely functional data structures
Okasaki and others have demonstrated how purely functional data structures that are efficient even in the presence of persistence can be constructed. To achieve good time bounds e...
Nils Anders Danielsson
ICFP
2001
ACM
15 years 9 months ago
Macros as Multi-Stage Computations: Type-Safe, Generative, Binding Macros in MacroML
With few exceptions, macros have traditionally been viewed as operations on syntax trees or even on plain strings. This view makes macros seem ad hoc, and is at odds with two desi...
Steven E. Ganz, Amr Sabry, Walid Taha
SDM
2009
SIAM
160views Data Mining» more  SDM 2009»
15 years 6 months ago
Discovering Substantial Distinctions among Incremental Bi-Clusters.
A fundamental task of data analysis is comprehending what distinguishes clusters found within the data. We present the problem of mining distinguishing sets which seeks to find s...
Faris Alqadah, Raj Bhatnagar
ACSC
2009
IEEE
15 years 4 months ago
Microdata Protection Through Approximate Microaggregation
Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained special interest after the disclosure of 658000 queries by the America Online...
Xiaoxun Sun, Hua Wang, Jiuyong Li